Overview
Explore a comprehensive conference talk on actionable threat intelligence, focusing on ISIS and the SuperBall. Learn how to build effective threat models by identifying assets and attackers, manage assets, collect intelligence, and understand threat actors. Dive into the Threat Intelligence Pyramid and discover preemptive, reactive, and ongoing threat intelligence strategies. Gain insights on implementing actionable intelligence through preemptive incident response, postmortem analysis, and counter-intelligence techniques. Understand the importance of feedback loops and metrics in threat intelligence. Conclude with a summary of key concepts and limitations in the intelligence cycle.
Syllabus
Introduction
Building a Threat Model
Assets
Attackers
Asset Management
Collecting Intelligence
Threat Actors
General Threat Intelligence
How
Threat Intelligence Pyramid
Preemptive Threat Intelligence
Reactive Threat Intelligence
Ongoing Threat Intelligence
Actionable
preemptive incident response
postmortem analysis
counter intelligence
for intelligence
feedback loop
metrics
summary
limit
cycle